Abstract
Original language | English |
---|---|
Title of host publication | 4th International Conference on Provable Security (ProvSec 2010) |
Editors | Swee-Huay Heng, Kaoru Kurosawa |
Place of Publication | Heidelberg Germany |
Publisher | Springer |
Pages | 166 - 183 |
Number of pages | 18 |
Volume | 6402 |
ISBN (Print) | 9783642162794 |
DOIs | |
Publication status | Published - 2010 |
Externally published | Yes |
Event | International Conference on Provable Security, 2010 - Malacca Malaysia, Heidelberg Germany Duration: 1 Jan 2010 → … |
Conference
Conference | International Conference on Provable Security, 2010 |
---|---|
City | Heidelberg Germany |
Period | 1/01/10 → … |
Cite this
}
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity. / Tsang, Patrick P; Au, Man Ho Allen; Liu, Joseph K; Susilo, Willy; Wong, Duncan Shek.
4th International Conference on Provable Security (ProvSec 2010). ed. / Swee-Huay Heng; Kaoru Kurosawa. Vol. 6402 Heidelberg Germany : Springer, 2010. p. 166 - 183.Research output: Chapter in Book/Report/Conference proceeding › Conference Paper › Research › peer-review
TY - GEN
T1 - A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
AU - Tsang, Patrick P
AU - Au, Man Ho Allen
AU - Liu, Joseph K
AU - Susilo, Willy
AU - Wong, Duncan Shek
PY - 2010
Y1 - 2010
N2 - Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-based signature schemes have been proposed. In 2001, Rivest et al. introduced ring signature that provides irrevocable signer anonymity and spontaneous group formation. In recent years, ID-based ring signature schemes have been proposed and almost all of them are based on bilinear pairings. In this paper, we propose the first ID-based threshold ring signature scheme that is not based on bilinear pairings. We also propose the first ID-based threshold linkable ring signature scheme. We emphasize that the anonymity of the actual signers is maintained even against the private key generator (PKG) of the ID-based system. Finally we show how to add identity escrow to the two schemes. Due to the different levels of signer anonymity they support, the schemes proposed in this paper actually form a suite of ID-based threshold ring signature schemes which is applicable to many real-world applications with varied anonymity requirements.
AB - Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-based signature schemes have been proposed. In 2001, Rivest et al. introduced ring signature that provides irrevocable signer anonymity and spontaneous group formation. In recent years, ID-based ring signature schemes have been proposed and almost all of them are based on bilinear pairings. In this paper, we propose the first ID-based threshold ring signature scheme that is not based on bilinear pairings. We also propose the first ID-based threshold linkable ring signature scheme. We emphasize that the anonymity of the actual signers is maintained even against the private key generator (PKG) of the ID-based system. Finally we show how to add identity escrow to the two schemes. Due to the different levels of signer anonymity they support, the schemes proposed in this paper actually form a suite of ID-based threshold ring signature schemes which is applicable to many real-world applications with varied anonymity requirements.
UR - http://goo.gl/Kyo0Jr
U2 - 10.1007/978-3-642-16280-0_11
DO - 10.1007/978-3-642-16280-0_11
M3 - Conference Paper
SN - 9783642162794
VL - 6402
SP - 166
EP - 183
BT - 4th International Conference on Provable Security (ProvSec 2010)
A2 - Heng, Swee-Huay
A2 - Kurosawa, Kaoru
PB - Springer
CY - Heidelberg Germany
ER -